2. HIPAA AND CONFIDENTIALITY
TRAINING
• Statement of the problem: Health
information systems (HIS) security
implementation require an in depth
consideration of all stakeholder to become
effective and safe.
3. HIPAA AND CONFIDENTIALITY
TRAINING (CONT.)
• Authorization in Cross-Border eHealth Systems
Information Systems Frontiers is a research
performed by He, et., al., (2012). They
researched in an e-Health system that crosses
different administrative domains, individual
organizations usually define their
authorization control policies independently.
4. HIPAA AND CONFIDENTIALITY
TRAINING (CONT.)
• managing effective processes and systems for
patients’ privacy, confidentiality,
• and the security of health information
maintained in paper or computerized systems.
6. HIPAA AND CONFIDENTIALITY
TRAINING (CONT.)
• Constructing useful electronic health record
systems will demand the expertise of doctors
and other clinicians, information management
and technology professionals, administrative
personnel, and patients.
7. HIPAA AND CONFIDENTIALITY
TRAINING (CONT.)
• The responsibilities for privacy and security can
be appointed to a member of the doctor’s office
staff or can be contracted to another electronic
healthcare vendor. The HIPAA Security Rule
regulates healthcare organizations to perform
audit trails, in which the organization must record
their information systems activity and have the
hardware, software, and methods to document
and review activity in systems that have
protected health information.
8. REFERENCE
He, D. D., Yang, J., Compton, M., & Taylor, K.
(2012). Authorization in Cross-Border
eHealth Systems. Information Systems
Frontiers, 14(1), 43-55.
http://10.1007/s10796-011-9316